Safe network authentication system and method

A network authentication and security technology, applied in the field of secure network authentication systems, can solve problems such as large security risks, loss of users and portals, and inability to automatically read removable peripherals.

Inactive Publication Date: 2008-11-12
任少华
View PDF1 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First, in this scheme, users only need to authenticate once on the portal to access all resource sites in the scheme. In this way, during the storage period of the cookie, other people can use the same computer with the user's authority Accessing resource sites, the security risk is greater if the user uses a public computer or someone else's computer (for example, an Internet cafe or a colleague's computer)
Second, standard browsers and cookie technology have limitations and defects when they are used to store this important authentication information. For example, cookies are disabled in some applications, and cookies have capacity limitations in various browsers. Standard browsing Devices and cookies cannot automatically read removable peripherals, etc.
This solution has many disadvantages, for example: first, users need to record their usernames and passwords registered at each resource site in the portal, so that users can assign all their permissions on the resource site to the portal, and the resource sites cannot distinguish Users and portals also lose the security guarantee for user rights. Secondly, portal sites log in to resource sites with fixed user names and passwords, and there are also great security risks.
[0005] In addition, the method of transferring IP addresses through the server widely used in the establishment of P2P connections in instant messaging conversations cannot be applied in some NAT situations, and the IP address transfer cannot be safely verified on the service side

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe network authentication system and method
  • Safe network authentication system and method
  • Safe network authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] In this embodiment, the intermediary party has a digital certificate issued by an authoritative organization, and the service party can use the digital certificate to verify the digital signature of the intermediary party. A dedicated program downloaded from the other party.

[0052] The specific steps of this embodiment are: the user runs the authentication program on the terminal, the authentication program automatically establishes an SSL connection with the intermediary, the user enters the AUID and password in the authentication program to log in, and the authentication program sends the user's AUID to the intermediary and password, the intermediary checks the user name and password, if they are correct, proceed to the following steps; otherwise, the intermediary saves the user's AUID, the SSL ID and the current system time correspondingly (the DES of the SSL stored by the user) The key is the authentication ID), when the user needs to access a resource of a server...

Embodiment 2

[0055] In this embodiment, the intermediary party has a digital certificate issued by an authority, and the service party can use the digital certificate to verify the digital signature of the intermediary party. The user side is authenticated by the intermediary party in the form of user name and login password. The authentication program is a browser.

[0056]The specific steps of this embodiment are: the user runs a browser object on the terminal and inputs the address of the intermediary (the browser object is used as an authentication program), and the intermediary establishes a session based on an SSL connection with the browser, wherein the intermediary generates A 1024-bit random sequence is used as the SessionID of the session established with the user's browser. The user enters the AUID and password on the interface launched by the intermediary to log in. The intermediary checks the AUID and password. If they are correct, proceed to the following steps; otherwise, stop...

Embodiment 3

[0058] In this embodiment, the service party knows the fixed IP address of the intermediary in advance, and the user is authenticated by the intermediary with a user name and a login password. The authentication program is a special program downloaded by the user from the intermediary.

[0059] The specific steps of this embodiment are: the user runs the authentication program on the terminal, the authentication program establishes a session with the intermediary and the SessionID is a 1024-bit random sequence generated by the intermediary, the user enters the user name and password in the authentication program to log in, the The authentication program sends the user's user name and password to the intermediary. The intermediary checks the user name and password. If it is correct, proceed to the following steps; The AUID of the user, the SessionID of the session established by the user authentication program, and the current system time are saved correspondingly. When the user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention adopts a safe network authentication system and a method thereof, which are used for solving the problems of security and convenience for internet users to login network resource. In the method of the invention, the users must go through the authentication of an agent and then pass the authentication of service suppliers. The method has the advantages of safety, high efficiency and convenience.

Description

technical field [0001] The invention relates to a secure network authentication system and method. Background technique [0002] The number of resources and services provided by the Internet is huge and growing rapidly. The Internet has become the main channel for people to obtain information resources and information services. Many online resources and services require users to log in and verify. However, the user's login information on different websites It is difficult to remember and there is a problem that the security is too low. [0003] At present, there is a solution to achieve centralized and unified authentication on the portal through the cookie technology of standard browsers, but there are great defects. First, in this scheme, users only need to authenticate once on the portal to access all resource sites in the scheme. In this way, during the storage period of the cookie, other people can use the same computer with the user's authority Accessing resource sit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 任少华
Owner 任少华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products